Secure Wireless Internet of Things Communication Using Virtual Private Networks
Total Page:16
File Type:pdf, Size:1020Kb
Secure Wireless Internet of Things Communication using Virtual Private Networks 1 2 3 4 Ishaan Lodha , Lakshana Kolur , K Sree Hari , and Prasad Honnavalli 1 PES University, Outer Ring Road, Bangalore. [email protected] 2 PES University, Outer Ring Road, Bangalore. [email protected] 3 PES University, Outer Ring Road, Bangalore. [email protected] 4 PES University, Outer Ring Road, Bangalore. [email protected] Abstract. The Internet of Things (IoT) is an exploding market as well as a important focus area for research. Security is a major issue for IoT products and solutions, with several massive problems that are still commonplace in the field. In this paper, we have successfully minimized the risk of data eavesdropping and tampering over the network by securing these communications using the concept of tunneling. We have implemented this by connecting a router to the internet via a Virtual Private network while using PPTP and L2TP as the underlying protocols for the VPN and exploring their cost benefits, compatibility and most importantly, their feasibility. The main purpose of our paper is to try to secure IoT networks without adversely affecting the selling point of IoT. Keywords: IoT, networks, security, sensors, wireless communication, sensor networks. 1 Introduction IoT is the connection of everyday mundane devices and things to a network like the internet. IoT has gained immense popularity in the recent years due to the low cost of and easily deployed sensors and actuators which can easily be controlled by micro controllers and availability of IPv6 addresses. IoT is also one of the largest source of data in the world. It is estimated to have generated more than 500 ZB by the end of 2019[1]. The data will be mainly sensor data from the manufacturing and health care industries as they account for over 70% of IoT devices. Only 0.06% of total devices that can be connected to the internet are actually connected, which shows the potential for a huge IoT data 2 2 USP of IoT - Challenges for Security The main selling points for the widespread and easy adoption of IoT are the very reasons that hinder its security and don't allow easy implementation of conventional security procedures on them. Thus any security procedure that is designed for IoT devices should be in tandem with these USPs and complement them in order for these procedures to be adopted by the industry. • Small Size: IoT components are typically very small with minimal processing power. They have the minimum processing capability to serve their purpose, which allows them to remain cheap and small. They are not capable of executing conventional forms of heavy encryption and other security procedures. • Energy Efficiency: IoT devices are predominantly battery powered and consume minuscule amounts of power. In adding security features we cannot drastically increase the power consumption of the devices as it would render them incompetent in the market [2]. The small battery also accounts for its small size and low cost which enable their large scale deployment. • Usage Lifetime and Accessibility: IoT devices are deployed for considerably long periods of time of up to 5 years without almost any direct user contact or maintenance intervention in this period. Thus the methods implemented should not require users to access the IoT device for anything in this duration. They are also deployed in remote inaccessible locations, need for repeated intervention would be a hindrance to this cause. • Cost: IoT devices are generally cheap and thus if implementation of security solutions makes them considerably more expensive then it would not perform well in the market, thus the cost effect of security features has to be minimal. Thus several constraints are in place in making IoT networks secure without disrupting the present status quo in the industry. It has been attempted to secure these networks with minimum impact on the status quo and thus device a solution acceptable to and implementable by the industry. 3 Approaches and their Feasibility The most common approaches to IoT security that are being extensively explored in ongoing research are as follows: 3.1 Hardware Implemented Security Implement encryption on the silicon chip so that end-to-end communication is secure from the beginning. These security chips essentially give you a trusted 3 environment that can be used for what is called a ‘hardware root of trust’. These have a very specialized operating system, a specialized environment, that is built into that chip, all designed from scratch with security as a top priority. The first layer of security is on-device mitigation and hardware-implemented security is one way of achieving that. It is for security over the application layer and despite the network being secure if the end devices are not, attacks and threats are possible. 3.2 Device Authentication There is a conflict in the implementation of device authentication, that is between hoe secure the authentication technique is, against how practical it is to implement it onto a small, low-cost IoT device. We need to apply the Principle of Adequate Protection where we need to choose a method that is a balance of both, that is secure enough but also cost-effective. The RSA key used for communication like ssh (secure shell) between hosts can be used for authentication of IoT devices and the recipient host. The drawback of this method is that the RSA key is large in size and its generation is computationally intensive because it has to generate a large number of bits. This is not feasible to be implemented on minute IoT devices since they need to be energy effective. [3] 3.3 Light Weight Encryption There are various requirements to decide what sort of cipher to use: which are size, power consumption and processing speed (throughput, delay). Once we judge the edge device based on these parameters, we decide on using either a symmetric or an asymmetric encryption algorithm. [4] Symmetric encryption is where only one key is used to encrypt as well as decrypt information and asymmetric encryption is where there are two cryptographic keys, namely, a public key as well as a978 private key where the public key can be used to encrypt information and data but only the private key of the user can be used to decrypt it. [5] 3.4 Securing the Network A plethora of companies use this process in allowing employees remote access to their business systems over the public internet. Virtual Private Networks give a virtual direct connection between systems over the public internet. They extend personal networks over the internet. By connecting the IoT devices to the edge devices over a VPN we can ensure that the data is not eavesdropped on or altered en route. This is a tried and tested method of transferring sensitive data over an unsecured network and does not add computational or temporal overhead. 4 4 Tunneling The mechanism of the tunneling protocol is as follows: it takes the part of the packet that contains information and uses it to store the packets that actually assist in solving the problem. The protocols used by tunneling are layered, which consist of protocols such as OSI or TCP/IP. The packets that assist in service are known as payloads, these operate at a layer which is one below that of the parent packets in which they are encapsulated. [6] Proposed work uses tunneling protocol as a way to create a virtual private network. It hides all communication between the hosts connected to it by way of encryption and hiding the hosts, thus creating an illusion of the absence of any devices or communication. The most commonly used protocols for tunneling are: 4.1 Point to Point Tunneling Protocol Point to point tunneling protocol also known as PPTP. The main concept of this protocol is a client-server design. This runs on the data-link layer in the OSI hierarchy. This protocol is widely used to tunnel data over the internet. In order to initiate the connection, the user launches a point to point tunneling protocol client that in turn establishes a link to their internet provider. After this, there is a TCP connection established between the client and the server of the Virtual Private Network. It makes use of port 1723 and the concept of GRE (General Routing Encapsulation) to create the tunnel. This setup can also be done over a local network. The next step is the information flow. [7] 4.2 Layer 2 Tunneling Protocol The objective of this protocol is to use an encryption mechanism in conjunction with it that is passed through the tunnel in order to achieve security of data. This is also an improvement over the Point to Point Tunneling Protocol. The protocol it uses to send the data and the header of L2TP is UDP. The reason for choosing UDP over TCP is so that we can avoid the “TCP meltdown problem”. The point to point sessions are established within an L2TP tunnel. The protocol doesn’t provide any sort of confidentiality by itself. Protocols such as IPsec are used to secure the L2TP tunnel. Together they are known as L2TP/IPsec. There are two ends of any L2TP tunnel. They're known as the LNS and the LAC. The LNS or the L2TP Network Server keeps searching for new tunnels. Once a connection is setup the transfer of data is full duplex. There are upper level protocols which are used in order to use this protocol for networking, this is done using an L2TP session. Either the L2TP network server or the L2TP Access Concentrator can send a request for a session.